Years of Experience distribution graph for Cyber Security Engineers in Dallas-Fort Worth.Cyber Security Engineers in Dallas-Fort Worth have between ${} and ${} years of experience, averaging $${} years of experience.

Ladders Rank is a grading system that calculates the optimal cities for this job title. The formula is based on annual compensation, amount of open jobs, and the Adjusted Cost of Living Index (ACLI).

AREA

Major city and nearby areas

$
AVG

Average annual compensation

$
ADJ

Adjusted for cost of living

OPEN JOBS

Number of job opportunities

Ladders Rank is a grading system that calculates the optimal cities for this job title. The formula is based on annual compensation, amount of open jobs, and the Adjusted Cost of Living Index (ACLI).

In this role, the selected candidate will be responsible for troubleshooting techniques for protection and vulnerability assessment; provide Entergy with IPS reports ad/hoc when requested and for support.

In this role, the selected candidate will develop and uses scripting tools and automation to develop real-time monitoring, metrics, certification and quality assurance applications. Participate in the research, analysis, design, testing and implementation of complex computer network security/protection technologies for company information and network systems/applications.

In this role, you will provide pre-sales technical support to Check Point Global Account Managers and strategic Check Point customers, developing POCs & crafting revenue generating services in order to influence sales.

The Cyber Security Engineer will be responsible for Application Control deployment and administration, ePO administration with additional focus on their VSE, HIPs, DLPe modules, MA, along with TIE, DXL, ATD and MAR (these last 4 are new products that we would be willing to work with the partner to have the potential candidate trained on during the engagement, so not having these skills at hire is not a disqualifying factor).

In this role, you will provide pre-sales technical support to Check Point Global Account Managers and strategic Check Point customers, developing POCs & crafting revenue generating services in order to influence sales.

In this role, the selected candidate will perform assigned engagement activities as directed, seek assistance as needed; implement the security assessment approach, enumerating and documenting security weaknesses in the clients environment.

The selected candidate will work closely with enterprise IT, Delivery, Security Operations, line of business, and other customers to ensure adequate security solutions to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements.

In this role, the selected candidate will perform constant monitoring and awareness of key developments in the area of systems, web application, and client application security in order to provide direction of security trends, and anticipate emerging standards and best practices.

This is a great move for you, if you want to throw a lot of skills and experience into a blender and do something a little different every day - operations, post-sales (cannot be afraid of customers, if you are, move it along); play with HTML; HTTP/HTTPS; Linux and Database technologies.

In this role, the selected candidate must have an experience into a blender and do something a little different every day operations, post-sales (cannot be afraid of customers, if you are, move it along); play with HTML; HTTP/HTTPS; Linux and Database technologies.

In this role, you will monitor departmental IT resources and identify security violations, determine new or improved security requirements, and develop information security procedures to limit security exposures.